Inappropriate Language
My bank sends a six character code of three letters and three numbers to my phone, so that I can login.
Today, the three letters were KKK.
How inappropriate is that?
I have complained!
Travelling Light
I’m off to Hamburg today and I’m tavelling Ultra Light, unlike some people, who seem to travel with most of their wardrobe and half of their library.
Travellers should follow the advice of the famous BBC reporter; the late great James Cameron, who recommended arranging everything you thought you would need in two piles, with half of everything in each. Then you packed them in two cases and only take one. He also suggested adding up all the money you are likely to need and then double it. I always travel with enough spare credit on my cards for all eventualities.
I even saw one guy this morning with four four-wheel cases struggling to keep them in check. He should have brought a bright collie to round them up!
Still, I had a good laugh at security, as I was through in a couple of minutes.
As you are obviously tracked through security, the airport or train station could give a bonus to all fast travellers. That would certainly speed things up.
Protecting Your Company, Organisation Or Workgroup From Viruses, Ransomware And Other Malware
I am not a computer malware expert and since 1970, I have generally worked alone, with one or more computers , not connected by a network.
But after all the problems of the last few weeks with ransomware, I feel that one of my experiences of a few years ago, should be put into this blog.
A Daisy Demonstration
The Research Department of a major corporation were interested in using my software; Daisy to analyse data being collected in their local offices.
So I was summoned to their offices to the South West of London, so that they could have a proper demonstration.
I found something extremely sensible that I’d not seen before.
The Department had the usual corporate network, as you would expect, with logins, malware protection, but for my demonstration I used another computer.
The Lonely PC
We moved to a lonely PC sitting on a desk in the corner. It had the following characteristics.
- Adequate power.
- A recent version of Windows.
- Direct connection to the Internet through a landline.
- No connection to the main network.
- A directly connected printer.
- A selection of browsers.
- Microsoft Office, but no e-mail program.
The only thing, that the computer lacked was a large screen.
Uses Of The Isolated Computer
The isolated computer was used for the following.
- Demonstrations
- Checking out ideas and web sites in suspect locations.
- Testing software.
I think that after the recent ransomware attacks, emergency Internet access could probably be added to the list of uses.
Rules For Using The Computer
The Department had setup a series of rules for the use of the computer.
- The computer could be booked by anybody in the Department.
- Comprehensive data transfer rules using physical devices had been setup.
- No software could be installed on computers on the main network, without full testing on the isolated computer.
- The computer was regularly checked for any viruses or malware.
- If any nasties were found on this computer, it was immediately restored to a pristine state.
Incidentally, whether it was for my benefit or not, it was one of the cleanest corporate computers, I’ve used for a demonstration.
Benefits
I was told that since the computer had been installed, malware problems on the network had decreased.
But how much was this down to a constantly improving and rigorously updated malware-protection system for the Department’s main network?
An Ideal System
A lot would depend on the type of company and their needs.
The system I used needed a big screen, as often a demonstration needs to be seen by several people.
I also think, that with a large screen, it could be a valuable tool in Corporate Communications.
Some might think, that this type of computer, which bypasses the corporate network, could be used by those with access for nefarious purposes.
Years ago, my software; Artemis was used to do the Project Management on Chevaline. The Ministry of Defence was worried that the Russians might use some unknown technology to read the electromagnetic radiation from the cathode-ray tube of the VDU. So I suggested they put the desk-sized computer in a shielded internal room. But what about the door, they said! I suggested that they get Chubb to put one of their best locks on the door.
A few weeks later, when a software problem struck, I went home with a complete copy of the project on a disc.
I had encoded the data using a personally-designed method that I still believe is unbreakable. But that is another story! Especially, as I’ve never signed the Official Secrets Act!
As this tale illustrates, there are ways to enforce security and holes will always appear.
A Curious Problem With My Credit Cards
A few months ago, I tried to order some goods from IKEA for my kitchen. They weren’t delivered and my credit card wasn’t debited, so the only harm done was I waited in for a whole day for a non-delivery.
Over the next couple of months, I tried several times to repeat the order, but in no cases was it ever completed. Immediately, When I entered the details of either of my credit cards, the order disappeared.
To solve the problem, I took a bus to IKEA in Tottenham and placed the order personally, paying with my American Express card at the check-out. I also got the direct e-mail address of the Kitchen Department and sent them a couple of e-mails to assure them, that if they didn’t deliver, they’d be deep in the doodah.
The goods were eventually delivered on the day, but the driver’s sat-nav got him lost in the mews at the back of my house.
I put it down to some form of problem with the delivery system, that checks the credit rating of the purchaser. But as Experian have confirmed, my credit rating is good and the only problem, is that I’m not correctly on the Electoral Roll. And that’s not for dint of trying, but for some reason they seem incapable to get it right!
However, today I needed to buy a coach ticket from National Express for the Ipswich-QPR match on Boxing Day.
So I entered my details to buy the ticket and tried to pay by credit czrds. Both were rejected.
I phoned both credit card suppliers and there was no problem with either card.
As a last resort, I phoned National Express direct and bought the ticket traditionally from the Call Centre at the cost of a long phone call and a booking fee.
But it wasn’t without trouble.
Both my credit cards were rejected by the system used by the very patient Colin in the Call Centre, as was my debit card.
Their system knew about me from my previous four failed attempts to buy tickets on-line and I wondered if it was rejecting them because of my address, which was on some sort of blacklist.
I’ve often thought this, as my house was tenanted for several years before I bought it and the tenants did runners leaving piles of debts to several companies.
In the end, Colin and I felt this was all rather silly, so I thought about trying an alternative e-mail address, as this was probably the key used to access my address on their computer.
It worked and I got my ticket.
Intriguingly in both cases, I got my goods or tickets, when I broke the link between debit/credit card address and the address for the card.
In IKEA, this was by putting the AMEX card through a till and with National Express, it was by giving them an e-mail address for which they had no physical address details.
I am drawn to the inevitable conclusion, that software checks my address against County Court Judgements. And I think there could be a lot of them, due to the history of the property!
Surely, if I can’t purchase on-line, because of the debts of previous owners or their tenants, who lived here, before I bought the house, then that is illegal!
The only way to lose them, would be the same way to get rid of bindweed from your garden. Move!
Unless of course, someone reading this knows better?
My New Front Door Lock
I’ve finally got a new front door, replacing the rotting one, that Jery had used.
A new door needed a new lock, so I went to the excellent Franchi on the Holloway Road and bought a Banham.
The lock did cost me £230, but then it does have a few advantages other than the strength and security it offers.
The biggest one is that to be secure, I now need only one normal-sized key.
When I go out, I just pull the handle to open the door and close it behind me to securely activate the lock.
It also means that I don’t have to find the key to let visitors in or open the door to such as postmen and couriers. When a visitor leaves they just open the door and shut it behind them.
So hopefully life will be easier and I won’t be constantly going up and down the stairs. It should be said that for most of the year, I have an upstairs window open and I just put my head out to check who’s there!
These Banham locks must be one of the classic British designs. And the company is still owned by the original family.
Plastic Belt Buckles
I object to taking my belt off in airport security, as because of my gammy left hand, I need a mirror to get it back in again.
At Gatwick, I said could I not and said why, but the guy said you’ll have to take it off, if it beeps in the machine.
It didn’t beep and I kept it on.
In the 1970s I worked for ICI Plastics and there were plastics then, that were strong enough to make belt buckles, that wouldn’t be dangerous or set off medal detectors.
So why don’t we have them now?
If nothing it would speed up security!
Barclays Loses Customer Data
Why is it the banks always seem to get things wrong? Or are they just accident prone?
This morning customer data from Barclays is reported to be on sale, here on the BBC.
I will not prejudge where the leak of information came from, but it will be interesting to see who did the dirty deed.
I suspect though we’ll see an increase in phishing scams tasrgeting Barclays customers.
Passwords
The BBC has an article on their web site today about passwords for Internet sites.
I go in to lots of sites and there are some I never use as their security doesn’t suit me.
If a site insists, I use a shift to enter a password, then that company doesn’t get my business. I think that Verified by Visa insists on this, so I never use my Visa card on-line. So if I see an on-line transaction, when I check my Visa account, I know it’s fraud.
Incidentally, I think it’s a good idea to only use one card for on-line transactions and keep that secure in a close place by your computer.
My passwords are generally based on phone numbers, that I remember from my childhood, which were like the classic Whitehall 1212, which was Scotland Yard. You can check your password here. They say, that it would take a PC a thousand years to crack one of my passwords. But even my immediate family wouldn’t probably have known the number.
And all it was was an old London phone number.
Even the last phone number I had in Suffolk, which was Thurlow 789, would take a computer 10 days. The previous phone number at Debach, which was on a small exchange called Charsfield and was just three digits, would take a thousand years. Unless of course you had my details from the 1970s.
Incidentally, if I translate my current phone number, back to the exchange name that would take 27 years. If you want to translate your London number, there’s a list here.
So it would appear you can be both lazy and secure!